Loading... The system can't perform the operation now. Try again later.

## Cite

## Advanced search

ArticlesCase lawProfiles My profileMy libraryAlertsMetrics Settings Sign in Sign in ArticlesScholar About 101 results (**0.04**sec) My profileMy library

### [HTML][HTML] MD4 message digest algorithm

RL Rivest - 1990 - tools.ietf.org [Docs] [txt|pdf] [IPR] Obsoleted by: 1320 INFORMATIONAL Network Working Group R. RivestRequest for Comments: 1186 MIT Laboratory for Computer Science October 1990 The MD4

Message Digest Algorithm Status of this Memo This RFC is the specification of the MD4 Digest … Cited by 1169 Related articles All 16 versions Cached [PDF] springer.com

### Cryptanalysis of MD4

H Dobbertin - International Workshop on Fast Software Encryption, 1996 - Springer In 1990 Rivest introduced the hash function MD4. Two years later RIPEMD, a Europeanproposal, was designed as a stronger mode of MD4. Recently we have found an attack

against two of three rounds of RIPEMD. As we shall show in the present note, the methods … Cited by 448 Related articles All 33 versions [PDF] springer.com

### RIPEMD-160: A strengthened version of RIPEMD

H Dobbertin, A Bosselaers, B Preneel - International Workshop on Fast …, 1996 - Springer Cryptographic hash functions are an important tool in cryptography for applications such asdigital fingerprinting of messages, message authentication, and key derivation. During the

last five years, several fast software hash functions have been proposed; most of them are … Cited by 637 Related articles All 127 versions [HTML] ietf.org

### [HTML][HTML] The MD5 message-digest algorithm

R Rivest - 1992 - tools.ietf.org [Docs] [txt|pdf] [draft-rsadsi-rive...] [Diff1] [Diff2] [IPR] [Errata] Updated by: 6151 INFORMATIONALErrata Exist Network Working Group R. Rivest Request for Comments: 1321 MIT Laboratory for

Computer Science and RSA Data Security, Inc. April 1992 The MD5 Message-Digest Algorithm … Cited by 6023 Related articles All 11 versions Cached [PDF] springer.com

### Collisions for the compression function of MD5

B den Boer, A Bosselaers - Workshop on the Theory and Application of of …, 1993 - Springer Abstract At Crypto'91 Ronald L. Rivest introduced the MD5 Message Digest Algorithm as astrengthened version of MD4, differing from it on six points. Four changes are due to the two

existing attacks on the two round versions of MD4. The other two changes should … Cited by 413 Related articles All 22 versions [PDF] springer.com

### One way hash functions and DES

RC Merkle - Conference on the Theory and Application of …, 1989 - Springer One way hash functions are a major tool in cryptography. DES is the best known and mostwidely used encryption function in the commercial world today. Generating a one-way hash

function which is secure if DES is a “good” block cipher would therefore be useful. We show … Cited by 1041 Related articles All 9 versions [PDF] springer.com

### An attack on the last two rounds of MD4

B Den Boer, A Bosselaers - Annual International Cryptology Conference, 1991 - Springer Abstract In [Rive90] the MD4 message digest algorithm was introduced taking an inputmessage of arbitrary length and producing an output 128-bit message digest. It is

conjectured that it is computationally infeasible to produce two messages having the same … Cited by 185 Related articles All 22 versions [PDF] uow.edu.au

### HAVAL—a one-way hashing algorithm with variable length of output

Y Zheng, J Pieprzyk, J Seberry - International workshop on the theory and …, 1992 - Springer A one-way hashing algorithm is a deterministic algorithm that compresses an arbitrary longmessage into a value of specified length. The output value represents the fingerprint or

digest of the message. A cryptographically useful property of a one-way hashing algorithm is … Cited by 295 Related articles All 51 versions [PDF] springer.com

### A design principle for hash functions

IB Damgård - Conference on the Theory and Application of …, 1989 - Springer We show that if there exists a computationally collision free function f from m bits to t bitswhere m> t, then there exists a computationally collision free function h mapping messages

of arbitrary polynomial lengths to t-bit strings. Let n be the length of the message. h can be … Cited by 1322 Related articles All 11 versions [PDF] springer.com

### Cryptanalysis of the Hash Functions MD4 and RIPEMD

X Wang, X Lai, D Feng, H Chen, X Yu - … on the theory and applications of …, 2005 - Springer MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of thededicated hash functions such as MD5, SHAx, RIPEMD, and HAVAL. In 1996, Dobbertin

showed how to find collisions of MD4 with complexity equivalent to 2 20 MD4 hash … Cited by 576 Related articles All 22 versions

**Previous**

**1**2 3 4 5 6 7 8 9 10

**Next**

**1**2345678910 HelpPrivacyTerms